Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - chemlud

#1
Practical experience over about 10 years with openVPN and then the last maybe 5-6 years with WG:

Configure more than one dynDNS fpr each IP to be monitored. Nearly no service interruption, only if the net access provider fails to do what he is paid for.

Experience of others in this forums, too...
#2
Quote from: Patrick M. Hausen on January 04, 2026, 12:17:08 AMFor stable VPN connections static IP addresses are mandatory, IMHO.

Hell, no, works just fine.

Quote from: Patrick M. Hausen on January 04, 2026, 12:17:08 AMI never used anything else.

So, how can you know in the first place? With zero practical experience with WG and DynDNS? I prefer to post only on issues I personally have experience with...
#3
serious question: and this problem really can't be adressed adequately by the cron job on DNS resolution of wireguard endpoints outtlined above? really?
#4
Golden rule of FOSS: If not everybody can reproduce, it's YOUR bug. Sorry, that's the way it is.

Various WG tunnels here, no problems with reboots for years...
#5
Which bug?
#6
Quote from: tdalej on December 17, 2025, 09:58:02 PMI added out and in rule because I need to be able to register the camera to the NVR and it needs bi directional traffic?
The rules right below block all traffic between those networks if I understand them correctly.


No, read about "stateful firewall".

How about ipv6?
#7
rule 1 and 2: /32 instead of /24

why OUT rules? normally only IN needed. IN with respect to the interface....
#8
General Discussion / Re: block cameras to internet
December 17, 2025, 07:12:55 PM
Hi, I see different problems with your BLOCK rule:

- You want to block ipv6 traffic for ipv4 adresses (in your cam alias)? What is the status for ipv6 on your LAN? Place a general block ipv6 above your block rule and reduce the existing block rule to ipv4 protocols.

- Do your cams get reserved (static mapping, always identical) IPs (based on MAC) via DHCP? Only in this case the block rule will block the cams reliably.

Cheers (noisy in here... hohoho)
#10
Skip ssh rules in your config for Suricata. Done.
#11
Are you exposing ports on WAN?

If not: why run Suricata on that interface in the first place? To watch and see that the internet is a bad, bad place? :-D

Or at least disabel SSH rules, if no ssh port open...
#12
German - Deutsch / Re: Log Files der Firewall fehlen
November 30, 2025, 12:12:20 PM
System -> Configuration -> History vielleicht...
#13
German - Deutsch / Re: Log Files der Firewall fehlen
November 30, 2025, 09:14:18 AM
Hi, hier 25.7.8 und alle logs normal mit Firefox (latest)...

Anderer Browser (Palemoon) kann seit Jahren keine Logs der OPNsense darstellen. Browser gewechselt?
#15
25.7, 25.10 Series / Re: Wireguard & LAN-LAN SMB
November 18, 2025, 09:59:07 AM
Just an idea: NAS only allowing access from LAN IPs?